Pass the CompTIA Linux+ XK0-005 Questions and answers with CertsForce

Viewing page 8 out of 15 pages
Viewing questions 71-80 out of questions
Questions # 71:

Users are unable to create new files on the company's FTP server, and an administrator is troubleshooting the issue. The administrator runs the following commands:

Question # 71

Which of the following is the cause of the issue based on the output above?

Options:

A.

The users do not have the correct permissions to create files on the FTP server.


B.

The ftpusers filesystem does not have enough space.


C.

The inodes is at full capacity and would affect file creation for users.


D.

ftpusers is mounted as read only.


Expert Solution
Questions # 72:

Before a Linux administrator restarts a system using systemd, the administrator wants to know if any of the server users are currently logged in. Which of the following commands should the administrator use to verify that the server is not being used?

Options:

A.

loginctl list-sessions


B.

journalctl -u


C.

systemctl status user-sessions


D.

systemd --user


Expert Solution
Questions # 73:

A Linux administrator wants to verify the runtime parameters of a container's ENTRYPOINT process. Which of the following commands will allow the administrator to achieve this goal?

Options:

A.

docker inspect container


B.

docker ls container


C.

docker ps container


D.

docker logs container


Expert Solution
Questions # 74:

A DevOps engineer pushed the updated configuration to an existing branch of a remote Git repository. Which of the following commands should the Linux administrator use to obtain these configuration changes?

Options:

A.

git pull


B.

git log


C.

git fetch


D.

git checkout main


Expert Solution
Questions # 75:

An administrator has generated an RSA SSH key pair to log in to a remote server. After copying the public key and attempting to log in, the administrator sees the following message:

admin@192.168.10.50: Permission denied (publickey,password)

After seeing the message, the administrator attempts to connect using ssh -v admin@192.168.10.50 and notices the following debug output:

debug1: send_pubkey_test: no mutual signature algorithm

Which of the following actions should the administrator take first to remediate this issue?

Options:

A.

Issue systemctl restart sshd on the local server.


B.

Create a new key pair by running ssh-keygen -t ecdsa.


C.

Set PermitRootLogin yes in the /etc/ssh/sshd_config file.


D.

Update permissions on the /home/admin/.ssh directory to 700 on the remote server.


Expert Solution
Questions # 76:

Ann, a security administrator, is performing home directory audits on a Linux server. Ann issues the su Joe command and then issues the Is command. The

output displays files that reside in Ann's home directory instead of Joe's. Which of the following represents the command Ann should have issued in order to list Joe's files?

Options:

A.

su - Joe


B.

sudo Joe


C.

visudo Joe


D.

pkexec joe


Expert Solution
Questions # 77:

An organization's business office needs to collaborate on quarterly reports and asks the systems administrator to create a finance group. The administrator creates the following directory:

drwxrwxr-x business business 4096 Oct 15 16:40 q1

Which of the following commands will allow all members of the finance group to have group ownership of all files created in the q1 directory while ensuring that members of the business group preserve access? (Select two.)

Options:

A.

chgrp finance q1/


B.

chmod g+s q1/


C.

chmod u+s q1/


D.

chmod a+x q1/


E.

chown finance q1/


F.

chmod g+x q1/


Expert Solution
Questions # 78:

You have been asked to parse a log file of logins to determine various information about who is logging in and when.

INSTRUCTIONS

Open and inspect the Login log file.

Drag and drop the correct commands onto the output that was generated from that command.

Tokens can be used only once and not all will be used.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Question # 78

Question # 78

Question # 78


Expert Solution
Questions # 79:

An administrator has source code and needs to rebuild a kernel module. Which of the following command sequences is most commonly used to rebuild this

type of module?

Options:

A.

./configuremakemake install


B.

wgetgcccp


C.

tar xvzfbuildcp


D.

buildinstallconfigure


Expert Solution
Questions # 80:

Users report that they cannot access some files located in the /opt/finapp directory after a power outage caused an unexpected server restart. A Linux administrator examines the following filesystem details and system logs:

# mount | grep finapp

/dev/mapper/rhel-opt_finapp on /opt/finapp type xfs (rw,relatime,seclabel,attr2,inode64,logbufs=8,logbsize=32k,noquota)

# lsblk

NAME MAJ:MIN RM SIZE RO TYPE MOUNTPOINT

sda 8:0 0 931.5G 0 disk

├─sda1 8:1 0 1G 0 part /boot

└─sda2 8:2 0 930.5G 0 part

├─rhel-root 253:0 0 30.5G 0 lvm /

└─rhel-opt_finapp 253:1 0 900G 0 lvm /opt/finapp

# grep opt_finapp /var/log/messages

XFS (opt_finapp): Corruption detected in inode 3645, extent tree

Which of the following commands should the administrator run in an attempt to fix the filesystem?

Options:

A.

fdisk /dev/mapper/rhel-opt_finapp


B.

xfs_repair /dev/mapper/rhel-opt_finapp


C.

lvcreate -L900G -n opt_finapp rhel


D.

fsck.ext4 /dev/mapper/rhel-opt_finapp


Expert Solution
Viewing page 8 out of 15 pages
Viewing questions 71-80 out of questions